Static task
static1
Behavioral task
behavioral1
Sample
466a661d1ee44345b86c3db78641b0ddec7dbc72c4483d74bf0a0b16301cb678.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
466a661d1ee44345b86c3db78641b0ddec7dbc72c4483d74bf0a0b16301cb678.exe
Resource
win10v2004-20230915-en
General
-
Target
poker-pup-sam.zip
-
Size
156KB
-
MD5
75753023ca9a6b0db402130f1e291824
-
SHA1
9700bc501974aebfa6b539264a40010fce64c576
-
SHA256
2b1140fdfcd9734521ba866e85b9bdc63be643597b643db50087b9f38f4d93f8
-
SHA512
31e8bc06ebd42c847bd10e68cf982e466f3e4bf647f1d11a3c4d81ef43d936b276b61c1408916f76be522e5dc42c1afa34f34f15af82331cca6ab2178d35255a
-
SSDEEP
3072:yGRFLd0KVo29RJmZGQfD+coq4cBrDc3JF7RMcx/z8DCYu3II4cMbe:yEB+ErhmX6cotcdc3r7bb8DCYI70e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/466a661d1ee44345b86c3db78641b0ddec7dbc72c4483d74bf0a0b16301cb678
Files
-
poker-pup-sam.zip.zip
Password: infected
-
466a661d1ee44345b86c3db78641b0ddec7dbc72c4483d74bf0a0b16301cb678.exe windows:4 windows x86
013c0942f49276efd5e22a7e75daa1ad
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wsock32
WSAStartup
connect
socket
ioctlsocket
htons
select
closesocket
shutdown
send
recv
gethostbyname
inet_addr
setsockopt
WSACleanup
inet_ntoa
wininet
InternetOpenA
InternetConnectA
InternetCloseHandle
InternetCrackUrlA
HttpQueryInfoA
InternetReadFile
HttpOpenRequestA
InternetSetOptionA
HttpEndRequestA
HttpSendRequestA
kernel32
DuplicateHandle
GetCurrentProcess
CreatePipe
GetStdHandle
CreateMutexA
SizeofResource
LockResource
LoadResource
FindResourceA
GetProcAddress
LoadLibraryA
FreeLibrary
ResetEvent
InterlockedDecrement
WinExec
CreateProcessA
CreateDirectoryA
MoveFileA
GetFileAttributesA
InterlockedIncrement
WaitForMultipleObjects
SetFileAttributesA
GlobalFree
GlobalSize
GlobalUnlock
GlobalLock
GlobalAlloc
LocalFree
LocalAlloc
SetHandleInformation
ExitProcess
SetEvent
SetStdHandle
DeleteCriticalSection
GetTimeFormatA
GetDateFormatA
Sleep
CreateEventA
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
lstrcpyA
SetFilePointer
CopyFileA
WriteFile
ReadFile
DeleteFileA
GetFileSize
CreateFileA
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
GetVersionExA
GetCurrentDirectoryA
GetTempPathA
GetModuleFileNameA
WaitForSingleObject
QueryPerformanceCounter
OutputDebugStringA
lstrlenA
CompareStringW
CompareStringA
GetTickCount
GetModuleHandleA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
SetEnvironmentVariableA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetDriveTypeA
LCMapStringW
LCMapStringA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetConsoleMode
GetConsoleCP
GetTimeZoneInformation
GetFileType
SetHandleCount
GetStringTypeW
GetStringTypeA
GetACP
HeapCreate
HeapDestroy
SetLastError
FormatMessageA
FindClose
FindNextFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
GetFileTime
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetThreadLocale
GetVolumeInformationA
GetFullPathNameA
GetCurrentProcessId
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GlobalGetAtomNameA
lstrcmpA
GetCurrentThreadId
GlobalFlags
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GetLocaleInfoA
GetCPInfo
GetOEMCP
HeapAlloc
HeapFree
RtlUnwind
HeapReAlloc
VirtualAlloc
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
ExitThread
CreateThread
GetCommandLineA
GetProcessHeap
GetStartupInfoA
HeapSize
VirtualFree
user32
UnregisterClassA
PtInRect
GetClassNameA
GetDlgCtrlID
GetWindow
ClientToScreen
GetFocus
GetDlgItem
SetWindowPos
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
IsIconic
SystemParametersInfoA
CallWindowProcA
CopyRect
AdjustWindowRectEx
GetClassInfoExA
GetMenu
SetWindowsHookExA
MapWindowPoints
GetMessagePos
GetMessageTime
GetTopWindow
GetForegroundWindow
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetCapture
WinHelpA
RegisterWindowMessageA
CheckMenuItem
EnableMenuItem
ModifyMenuA
LoadBitmapA
GetMenuCheckMarkDimensions
ValidateRect
DestroyMenu
GetSysColorBrush
UnhookWindowsHookEx
GetParent
GetLastActivePopup
IsWindowEnabled
EnableWindow
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
CallNextHookEx
GetKeyState
GetWindowTextA
FillRect
ReleaseDC
IsWindow
IsRectEmpty
IntersectRect
UnionRect
KillTimer
SetTimer
GetDesktopWindow
GetWindowRect
TranslateMessage
DispatchMessageA
PostQuitMessage
GetClientRect
GetDC
EndPaint
GetClassInfoA
SendMessageA
GetWindowLongA
SetWindowLongA
EnumDisplaySettingsA
MessageBoxA
PostMessageA
SetForegroundWindow
PostThreadMessageA
GetMessageA
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
UpdateWindow
FindWindowExA
SetWindowTextA
DefWindowProcA
PeekMessageA
DestroyWindow
GetSystemMetrics
GetWindowPlacement
EnumWindows
GetWindowThreadProcessId
CharUpperA
LoadStringA
SetMenuItemBitmaps
GetSysColor
gdi32
SetMapMode
GetClipBox
SetTextColor
SetBkColor
RestoreDC
CreateBitmap
CreateDIBitmap
CreateSolidBrush
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
DeleteDC
SaveDC
DeleteObject
BitBlt
GetStockObject
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
advapi32
RegSetValueExA
RegCloseKey
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
shell32
ShellExecuteExA
shlwapi
PathStripToRootA
PathFindFileNameA
PathIsUNCA
oleacc
LresultFromObject
CreateStdAccessibleObject
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comdlg32
GetFileTitleA
oleaut32
VariantChangeType
VariantClear
VariantInit
Sections
.text Size: 224KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ